5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.0004 Low
EPSS
Percentile
9.1%
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords.
This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access.
[
{
"vendor": "Cisco",
"product": "Cisco IOS XE Software",
"versions": [
{
"version": "16.10.1",
"status": "affected"
},
{
"version": "16.10.1s",
"status": "affected"
},
{
"version": "16.10.1e",
"status": "affected"
},
{
"version": "16.11.1",
"status": "affected"
},
{
"version": "16.11.1a",
"status": "affected"
},
{
"version": "16.11.1b",
"status": "affected"
},
{
"version": "16.11.2",
"status": "affected"
},
{
"version": "16.12.1",
"status": "affected"
},
{
"version": "16.12.1s",
"status": "affected"
},
{
"version": "16.12.3",
"status": "affected"
},
{
"version": "16.12.8",
"status": "affected"
},
{
"version": "16.12.2s",
"status": "affected"
},
{
"version": "16.12.1t",
"status": "affected"
},
{
"version": "16.12.4",
"status": "affected"
},
{
"version": "16.12.3s",
"status": "affected"
},
{
"version": "16.12.4a",
"status": "affected"
},
{
"version": "16.12.5",
"status": "affected"
},
{
"version": "16.12.6",
"status": "affected"
},
{
"version": "16.12.6a",
"status": "affected"
},
{
"version": "16.12.7",
"status": "affected"
},
{
"version": "17.1.1",
"status": "affected"
},
{
"version": "17.1.1s",
"status": "affected"
},
{
"version": "17.1.1t",
"status": "affected"
},
{
"version": "17.1.3",
"status": "affected"
},
{
"version": "17.2.1",
"status": "affected"
},
{
"version": "17.2.1a",
"status": "affected"
},
{
"version": "17.3.1",
"status": "affected"
},
{
"version": "17.3.2",
"status": "affected"
},
{
"version": "17.3.3",
"status": "affected"
},
{
"version": "17.3.2a",
"status": "affected"
},
{
"version": "17.3.4",
"status": "affected"
},
{
"version": "17.3.5",
"status": "affected"
},
{
"version": "17.3.6",
"status": "affected"
},
{
"version": "17.3.4c",
"status": "affected"
},
{
"version": "17.3.5a",
"status": "affected"
},
{
"version": "17.3.5b",
"status": "affected"
},
{
"version": "17.3.7",
"status": "affected"
},
{
"version": "17.3.8",
"status": "affected"
},
{
"version": "17.3.8a",
"status": "affected"
},
{
"version": "17.4.1",
"status": "affected"
},
{
"version": "17.5.1",
"status": "affected"
},
{
"version": "17.6.1",
"status": "affected"
},
{
"version": "17.6.2",
"status": "affected"
},
{
"version": "17.6.3",
"status": "affected"
},
{
"version": "17.6.4",
"status": "affected"
},
{
"version": "17.6.5",
"status": "affected"
},
{
"version": "17.6.6",
"status": "affected"
},
{
"version": "17.6.6a",
"status": "affected"
},
{
"version": "17.6.5a",
"status": "affected"
},
{
"version": "17.7.1",
"status": "affected"
},
{
"version": "17.10.1",
"status": "affected"
},
{
"version": "17.10.1a",
"status": "affected"
},
{
"version": "17.8.1",
"status": "affected"
},
{
"version": "17.9.1",
"status": "affected"
},
{
"version": "17.9.2",
"status": "affected"
},
{
"version": "17.9.3",
"status": "affected"
},
{
"version": "17.9.4",
"status": "affected"
},
{
"version": "17.9.4a",
"status": "affected"
},
{
"version": "17.11.1",
"status": "affected"
},
{
"version": "17.12.1",
"status": "affected"
}
]
}
]